lockable

The Lockable feature prevents lost/stolen and skimming/counterfeit fraud by hiding a portion of the cardholder's account number.

To turn the device ON and reveal the full account number, a cardholder must enter a personal unlocking code by pressing the buttons on the face of the card. The requisite data is populated to the magnetic stripe, EMV, and NFC.

After an issuer-determined period of time, the display turns OFF and all critical payment information is removed from the surface of the card, rendering it essentially useless if lost or stolen as the account number is inaccessible.

dynamic security code

The press of a button generates a new CVC2 code for every purchase to protect online transactions. This feature replaces the static security code that is on the back of every payment card.

Consumer data is impervious to counterfeiting even if a merchant is compromised and the cardholder’s account data is stolen.

dynamic cvc1

This feature randomizes the CVC1 code that is embedded in the card’s magnetic stripe, EMV, and NFC. By writing a dynamic CVC1 code to the stripe at every purchase, adverse effects of data breaches are minimized as a cardholder’s magnetic stripe data cannot be duplicated.

This code is passed to Dynamics' proprietary verification system to ensure that only certain codes are valid within a given time window.

The verification technology can be seamlessly integrated into the issuer's payment processing system.

cardholder benefits

Provides security and peace of mind against online and store data breaches, and subsequent fraud.

Prevents the inconvenience and hassle associated with fraudulent or unauthorized use.

issuer benefits

The security enhancements drive a high volume of new accounts.

Reduces fraud by more than $5/account/year (as per studies by a major research firm).

Among security-conscious consumers, becomes top of wallet with nearly 100% of the cardholder’s spend.

Very high retention rates as consumers become reluctant to switch to a card without security benefits.

Security features and verification technology can be integrated into existing systems